`
`Exhibit 3
`
`
`
`US007990268B2
`
`(12) United States Patent
`Richman
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 7,990,268 B2
`* Aug. 2, 2011
`
`(54) METHOD AND PROTOCOL FOR REAL TIME
`SECURITY SYSTEM
`(75) Inventor: Lawrence Richman, La Mesa, CA (US)
`(73) Assignee: Richman Technology Corporation, San
`Diego, CA (US)
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 297 days.
`This patent is Subject to a terminal dis
`claimer.
`
`(*) Notice:
`
`(21) Appl. No.: 12/253,826
`
`(22) Filed:
`
`Oct. 17, 2008
`
`(65)
`
`Prior Publication Data
`US 2010/O2O7761 A1
`Aug. 19, 2010
`
`Related U.S. Application Data
`(63) Continuation of application No. 10/176,565, filed on
`Jun. 20, 2002, now abandoned, which is a continuation
`of application No. 10/139,110, filed on May 4, 2002,
`now Pat. No. 6,894,617.
`
`(51) Int. Cl.
`G08B I3/00
`
`(2006.01)
`
`(52) U.S. C. .................. 340/541
`(58) Field of Classification Search ............... 340/573.1,
`340/541, 506, 539.1, 539.11,539.14, 539.17,
`340/539.22, 3.1, 5.2: 345/7
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`... 340,541
`6,204,762 B1* 3/2001 Dering et al. ......
`7,242.295 B1* 7/2007 Milinusic et al. ............. 340,541
`* cited by examiner
`
`Primary Examiner — Phung Nguyen
`(74) Attorney, Agent, or Firm — Foley & Lardner LLP
`
`(57)
`ABSTRACT
`devi
`t
`A securit
`y System comprises one or more sensor dev1ces
`configured to detect conditions at one or more sites; one or
`more checkpoints at each of said one or more sites configured
`to receive signals from the one or more sensor devices; and a
`central headquarters processor configured to receive signals
`indicative of the conditions detected at said one or more sites
`from the one or more checkpoints. The central headquarters
`processor is configured to process the signals to determine if
`an event has occurred.
`
`58 Claims, 8 Drawing Sheets
`
`SE,
`is
`g Sensor
`
`a
`
`Wideo
`
`S.
`Video
`J. Sensor
`
`a
`
`Y
`Checkpoint
`Computer
`
`
`
`s
`Checkpoint
`Computer
`
`O
`
`N
`
`
`
`14
`N-
`
`12
`
`
`
`
`
`
`
`Case 6:20-cv-00769-ADA Document 1-3 Filed 08/25/20 Page 2 of 20
`
`
`
`headquarters
`
`
`
`U.S. Patent
`
`US 7,990.268 B2
`
`
`
`
`
`
`
`Case 6:20-cv-00769-ADA Document 1-3 Filed 08/25/20 Page 3 of 20
`
`
`
`U.S. Patent
`
`Aug. 2, 2011
`
`Sheet 2 of 8
`
`US 7,990.268 B2
`
`aseqeqed
`
`9909
`
`V/ 3)IS
`
`SJa?uenbpeaH O 1
`
`
`
`
`
`Case 6:20-cv-00769-ADA Document 1-3 Filed 08/25/20 Page 4 of 20
`
`IOSu3S
`
`
`
`U.S. Patent
`
`Aug. 2, 2011
`
`Sheet 3 of 8
`
`US 7,990.268 B2
`
`
`
`Case 6:20-cv-00769-ADA Document 1-3 Filed 08/25/20 Page 5 of 20
`
`H
`
`
`
`U.S. Patent
`
`Aug. 2, 2011
`
`Sheet 4 of 8
`
`US 7,990.268 B2
`
`
`
`
`
`
`
`
`
`Case 6:20-cv-00769-ADA Document 1-3 Filed 08/25/20 Page 6 of 20
`
`SJOSu3S
`
`
`
`U.S. Patent
`
`US 7,990.268 B2
`
`
`
`
`
`
`
`Case 6:20-cv-00769-ADA Document 1-3 Filed 08/25/20 Page 7 of 20
`
`7
`
`00||
`
`
`
`Case 6:20-cv-00769-ADA Document 1-3 Filed 08/25/20 Page 8 of 20
`Case 6:20-cv-00769-ADA Document 1-3 Filed 08/25/20 Page 8 of 20
`
`U.S. Patent
`
`US 7,990,268 B2
`
`
`mm;mo._tm_<
`EmDEZEmSUI
`IncaE-gm
`muoo-muoo
`
`932:2
`
`
`
`Em>m.omcmm
`
`
`
`
`
`mAmvmzfiiemuoo88$8n,EDDIE/QEm>m_Lowcmm
`myJA09Jm?328F
`
`
`
`Emgw>mE995
`Ew>mmeowcmw
`
`VNFNNF
`
`
`
`
`
`m2935mmmmE.«Gm.9;m9;3;$60.32.eqbocm
`
`33N9.
`
`053005
`
`9:2325.4
`
`m3
`
`mi©.m_H_
`
`
`
`
`
`
`U.S. Patent
`
`Aug. 2, 2011
`
`Sheet 7 of 8
`
`US 7,990.268 B2
`
`190
`
`192
`
`LEVEL
`Event SensOrS/Hardware
`
`LEVEL
`Conversion/Encryption
`
`194
`
`
`
`device
`language data
`signals
`
`XML format
`encrypted data
`messages
`
`196
`
`LEVEL
`SCA/Remote Users
`
`Case 6:20-cv-00769-ADA Document 1-3 Filed 08/25/20 Page 9 of 20
`
`
`
`U.S. Patent
`
`Aug. 2, 2011
`
`Sheet 8 of 8
`
`US 7,990.268 B2
`
`2OO
`
`a standardized
`message in
`XML format
`
`
`
`204
`
`
`
`input Device(s)
`
`
`
`Conversion Module
`
`Control Sum/CRC Adding Module
`
`hardware signal
`
`
`
`a standardized
`message in
`XML format
`
`
`
`"..."
`
`message
`
`208
`
`a signal at a
`specified serial
`port
`
`240 N-s-
`212
`
`a standardized
`message in
`XML format
`With CRC
`
`
`
`220
`
`
`
`
`
`
`
`standardized
`message in
`XML format
`
`Case 6:20-cv-00769-ADA Document 1-3 Filed 08/25/20 Page 10 of 20
`
`222
`
`224
`
`226
`
`-
`
`Serial Port USB/IR
`Transmitting
`Module
`N
`
`
`
`
`
`210
`
`UDP/TCP
`Transmitting
`UDP packet(s)
`Module
`Written to a
`specified UDP
`u
`Socket
`
`System Core
`Application
`
`Serial Port/USB/R
`Receiving Module
`
`UDP/TCP
`Receiving Module
`56
`Decryption Module
`
`214
`an encrypted
`eSSaCe
`216
`
`Control Sum/CRC Checking
`and Removing Module
`
`Message Filtering Module
`
`Message Queuing Module
`
`(
`Message Processing Module
`
`See
`
`218
`standardized
`message in
`XML format
`
`filtered
`standardized
`message in
`XML format
`
`Fig. 8
`
`
`
`US 7,990,268 B2
`
`1.
`METHOD AND PROTOCOL FOR REAL TIME
`SECURITY SYSTEM
`
`This application is a Continuation of U.S. patent applica
`tion Ser. No. 10/176,565, filed Jun. 20, 2002, which is a
`Continuation-in-part of U.S. patent application Ser. No.
`10/139,110, filed May 4, 2002, now U.S. Pat. No. 6,894,617,
`issued May 17, 2005, each of which are incorporated herein
`by reference in their entirety for all purposes.
`
`BACKGROUND OF THE INVENTION
`
`1. Field of the Invention
`The present invention relates to a multiple site integrated
`security system method and communications protocol. More
`particularly, the present invention relates to a human oriented
`system of security service and a computer implemented uni
`Versal communications protocol which facilitates communi
`cations between real time security hardware and a real time
`security monitoring Software system.
`2. Description of the Related Art
`In addition to traditional threats to security such as bur
`glary, Vandalism and arson, today's complex national and
`international political conflicts are putting increased pressure
`on facilities and organizations of all kinds to provide effective
`security systems for the safety and protection of personnel,
`property and Surroundings.
`Devices and systems for the provision of safety and Secu
`rity of persons and property are well known. Examples of
`different types and kinds of security systems for protection
`and Surveillance methods of building structures and Sur
`rounding areas are disclosed in U.S. Pat. Nos. 6,204,762 B1,
`6,154,133, 6,097,429, and 5,825,283.
`In general, the structure and function of most security
`systems involves electronic Surveillance equipment moni
`tored at a centralized location. Current development of secu
`rity systems attempts to do away with human-oriented Ser
`vices and replace the human security guard with high
`technology solutions to security problems. Only a limited
`number of currently developed security systems utilize a
`combination of guards in close conjunction with the elec
`tronic equipment. Most of the time, these systems involve one
`guard who monitors a video feed or alarm panel for intrusion
`or other related alerts. These security systems are commonly
`built, installed and implemented without any regard for the
`particular facilities of other systems, for example, the facili
`ties of built-in environmental and climate control, the track
`ing of people and assets within the building or complex, and
`fire/Smoke detection as well as transport systems such as
`elevators, etc.
`Therefore, it would be highly desirable to have a new and
`improved security system which not only enhances the
`human security guard services, but also integrates facilities
`management, and allows for identification and global posi
`tioning satellite (GPS) tracking of people as well as assets
`Such as computers, and other valuable instrumentation, all in
`a readily scalable configuration utilizing off the shelf elec
`tronic security and communications components.
`An electronic Surveillance system for remote guarding of
`an area using an operator station including a signal receiver
`with television display, radiant energy selection control, and
`energy level controller is known in the prior art. Such a device
`is described in U.S. Pat. No. 6,204,762 B1. The novel inven
`tion remotely controls and directs an apparatus “weapon' for
`integration with traditionally secured facilities, remote detec
`tion devices, closed circuit TV, and a remotely-located,
`manned control station. While Such a computerized system is
`
`Case 6:20-cv-00769-ADA Document 1-3 Filed 08/25/20 Page 11 of 20
`
`2
`helpful in detection of unauthorized personnel in a given area
`and does seek to incorporate pre-existing security devices,
`there is no provision which would allow for the irreplaceable
`and highly effective presence of human security guards,
`guards that are further enhanced by electronic wireless com
`munications and monitoring.
`Additionally, the entire system depends upon the installa
`tion and presence of numerous hard wired security devices in
`a given area and is not readily Scalable to incorporate larger
`areas in the surveillance area in a short period of time without
`extensive outlay of effort and installation of new equipment.
`The acoustic energy “weapon' used as a deterrent to intruders
`is not confined to any given space and might pose a threat to
`anyone, including authorized individuals, within hearing dis
`tance.
`Therefore, it would be highly desirable to have a new and
`improved enhanced security guard system which would allow
`for computerized and wireless communications and monitor
`ing of human security guards and their activities with a cen
`tralized location, in addition to conventional security devices
`and which would be scalable with minimal time and material
`expenditure, and which would provide for human guards to
`act as a more rapid and effective deterrent to intruders.
`The exit guard system described in U.S. Pat. No. 6,154,133
`addresses the requirements of providing areas with detection
`of movement of a Subject along an exit path in an unautho
`rized direction. This system further provides for a human
`monitor at a centralized location with added Supervision of
`the deactivation of the security alarm system only by autho
`rized personnel.
`However, within this system there is no human security
`guard on site actively patrolling the area. This electronically
`augmented human presence is irreplaceable as a deterrent to
`potential intruders as well as providing for flexibility in terms
`of monitoring and responding to a variety of situations that
`might arise.
`Therefore, it would be highly desirable to have a new and
`improved, technologically augmented human presence auto
`matically reporting to a centralized location, or a remote
`monitoring station through communications over a global
`computer network or via satellite link, which could then
`monitor and record guard activities as well as utilize pre
`existing event detection technology, such as motion, video
`and perimeter control devices to alert those guards of real
`time events taking place on their shift.
`U.S. Pat. No. 6,097,429 describes a relatively sophisticated
`security system utilizing video images obtained from a plu
`rality of cameras relayed to a site control unit equipped with
`an automated image processor. The images are then relayed to
`a security system operator who then analyzes the images and
`informs authorities of an intrusion.
`While this system utilizes advanced technological features
`to distinguish between actual intrusions and false alarms
`(friend or foe), the absence of a human guard which would
`serve to discourage intrusions is notably absent. Moreover,
`the presence of human guards makes those that are present
`within the facility feel protected and well taken care of, and
`these individuals will often speak to the security guards or
`become familiar with them to avoid any misunderstanding as
`to their access authorization or the like.
`Additionally, the highly automated image processor and
`related complex software used to differentiate between actual
`foe intrusions and friendly false alarms is inherently limited
`in its capability to observe, compare and react to the myriad of
`potential one time or entirely novel situations which might
`occur. This type of security monitoring can only be accom
`plished with highly trained, well equipped, and competently
`
`10
`
`15
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`
`
`5
`
`10
`
`15
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`Case 6:20-cv-00769-ADA Document 1-3 Filed 08/25/20 Page 12 of 20
`
`US 7,990,268 B2
`
`3
`Supervised human security guards on duty in numbers corre
`sponding to the amount of space or activity required to be
`secure from outside threats.
`Therefore, it would be highly desirable to have a new and
`improved system for technological augmentation of human
`guards who are irreplaceable interms of providing a deterrent
`to intrusion and who are capable of observing, assessing and
`responding to novel and unusual situations and whose actions
`would automatically be reported to a centralized headquarters
`with integrated automated daily events and incident real time
`reporting.
`Finally, U.S. Pat. No. 5,825.283 provides for an apparatus
`for monitoring Subjects having a location determining device
`which provides the location of the subject to a processor. The
`processor then Stores and retrieves data generated or received
`by the processor. The primary means by which the subject is
`tracked is by usage of a GPS. Comparison of the parameters
`of given geographical boundaries to the data from the location
`determining device may determine if the subject has deviated
`from those parameters. The claimed invention mandates
`detection of at least one physiological parameter of the Sub
`ject in order to compare existing Subject data previously
`stored.
`This imaginative invention does provide for tracking and
`determination of the general area in which a subject is to be
`found and a means by which to compare the location with a
`pre-determined geographic location. Unfortunately, while
`the location and tracking device may show a general area in
`which the Subject is located, there is no way of determining
`the exact location of the Subject at any given point in time.
`In addition, this system again depends upon a complex
`processor which must be programmed with any number of
`parameters. The system may fail to operate properly or may
`not operate at all if incorporated into a pre-existing security
`system, especially one having less complex processors avail
`able on site.
`Therefore, it would be highly desirable to have a new and
`improved system for technological augmentation of human
`guards automatically reporting exact location and time to a
`centralized headquarters with daily events and incident
`reporting automation which could give exact locations and
`time records of movement of the guards which would readily
`incorporate pre-existing hardware and Software. Moreover, it
`would be highly desirable to enable said guards to wear a
`garment which would incorporate a wireless communications
`apparatus, or have said guards carry hand-held computers for
`this purpose.
`With respect to security system and environmental system
`monitoring there have been no significant advances recently,
`especially in the area of software development that can be
`used to integrate far flung and varying system hardware con
`figurations. However, the development of global computer
`networks Such as the Internet have sparked new languages
`capable of being effectively used in numerous alternative
`applications. One such language is Hypertext Markup Lan
`guage or HTML and another such language is Extensible
`Markup Language or XML.
`Most documents on the Web are stored and transmitted in
`HTML.HTML is a simple language well suited for hypertext,
`multimedia, and the display of Small and reasonably simple
`documents. HTML is based on SGML (Standard Generalized
`Markup Language, ISO 8879), a standard system for defining
`and using document formats.
`SGML allows documents to describe their owngrammar
`that is, to specify the tag set used in the document and the
`65
`structural relationships that those tags represent. HTML
`applications are applications that hard-wire a small set of tags
`
`4
`in conformance with a single SGML specification. Freezing a
`Small set of tags allows users to leave the language specifica
`tion out of the document and makes it much easier to build
`applications, but this ease comes at the cost of severely lim
`iting HTML in several important respects, chief among which
`are extensibility, structure, and validation.
`
`S Extensibility. HTML does not allow users to specify their own tags or
`attributes in order to parameterize or otherwise semantically qualify their
`data.
`S Structure. HTML does not support the specification of deep structures
`needed to represent database schemas or object-oriented hierarchies.
`SValidation. HTML does not support the kind of language specification
`that allows consuming applications to check data for structural validity on
`importation.
`
`In contrast to HTML stands generic SGML. A generic
`SGML application is one that supports SGML language
`specifications of random complexity and makes possible the
`qualities of extensibility, structure, and validation missing
`from HTML. SGML makes it possible to define your own
`formats for your own documents, to handle large and complex
`documents, and to manage large information repositories.
`However, full SGML contains many optional features that are
`not needed for Web applications and has proven to have a
`cost/benefit ratio unattractive to current vendors of Web
`browsers.
`The World Wide Web Consortium (W3C) has created an
`SGML Working Group to build a set of specifications to make
`it easy and straightforward to use the beneficial features of
`SGML on the Web. Extensible Markup Language (XML) is a
`simple, very flexible text format derived from SGML (ISO
`8879). Originally designed to meet the challenges of large
`scale electronic publishing, XML is also playing an increas
`ingly important role in the exchange of a wide variety of data
`on the Web.
`XML Advantages:
`
`S Enables internationalized media-independent electronic publishing
`S Allows industries to define platform-independent protocols for the
`exchange of data, especially the data of electronic commerce
`S Delivers information to client users in a form that allows automatic
`processing after receipt.
`S Makes it easier to develop software to handle specialized
`information distributed over the Web
`S Makes it easy for people to process data using inexpensive
`software
`S Allows people to display information the way they want it, under
`style sheet control
`S Provides a standard packaging/transport mechanism for any type of
`information
`
`XML Syntax
`The best way to appreciate what XML documents look like
`is with a simple example. Imagine a company that sells prod
`ucts on-line. Marketing descriptions of the products are writ
`ten in HTML, but names and addresses of customers, and also
`prices and discounts are formatted with XML. Here is the
`information describing a customer:
`
`<customer-details id+ AcPharm3.9156'>
`<name>Acme Pharmaceuticals Co.</name>
`<address country+ “US">
`<streets-7301 Smokey Boulevard</streets
`<city>Smallville-city>
`
`
`
`US 7,990,268 B2
`
`5
`-continued
`
`<state-Indiana</state
`<postalD94571</postal
`<address>
`<customer-details.>
`
`6
`tems, facilities environmental control systems, such as cli
`mate control, fire and Smoke detection, and other varied
`parameters.
`Yet another object of the present invention is to provide a
`system which would automatically monitor and control cer
`tain movable and fixed site conditions such as people and
`vehicles at checkpoints, safety systems, access control sys
`tems, position sensors, transportation control systems, power
`Supply systems, water and hydraulic control systems, warn
`ing systems, lighting systems, communications systems and
`miscellaneous site-specific systems such as greenhouse tem
`perature controls.
`Still another object of the instant invention is to provide a
`system for security which monitors the identification and
`authorization of personnel inside secured areas through use of
`a two points access Subsystem composed of a fixed device
`installed at a checkpoint and a mobile device (wearable or
`hand held) carried by authorized personnel which could be
`configured to integrate pre-existing security systems without
`modification of the core program.
`Another object of the instant invention is to provide a guard
`activity and real time reporting Support system which
`includes a scheduled building and real time guard tour track
`ing System.
`Yet another object of the instant invention is to provide a
`computer implemented communications protocol whereby
`bi-directional data and command transmissions may occur
`between a base station and any designated personal identifi
`cation devices, which enables assistance deployment and
`transmits the location of the person, group of persons, secu
`rity guards and/or guard vehicles.
`A further object of the instant invention is to provide a
`computer implemented communications protocol which
`records real-time object identification data and tracking Sub
`systems data for indoor and outdoor areas.
`Another object of the present invention is to provide a site
`Video monitoring system that generates data which will be
`recorded, transmitted and displayed at a base station (com
`puter or server configuration) with the option of video data
`processing, to recognize and alert of certain predetermined
`events, such as access verification, etc.
`Still another object of the invention is to provide a com
`puter implemented communications protocol which will
`allow integration of hardware already existing at the site into
`the system without requiring purchase of redundant hard
`Wa.
`Yet another object of the invention is to provide a computer
`implemented communications protocol and system that
`allows for data exchange between base station and headquar
`ters and between base station and any other specified hard
`ware system and any other off-site computers (such as remote
`workstations).
`It is also another object of the present invention to provide
`a computer implemented communications protocol and sys
`tem which would automate time sheets, payroll recap and
`other accounting operations.
`It is another object of the present invention to provide a
`computer implemented communications protocol and system
`which provides complete availability of site level information
`from a centralized headquarters, or remotely away from a
`centralized headquarters.
`Still another object of the present invention is to provide a
`computer implemented communications protocol and system
`which would provide access to historical information such as
`time sheets, event logs, and alert logs to designated personnel.
`
`The XML Syntax uses matching start and end tags, such as
`<name> and </name>, to mark up information. A piece of
`information marked by the presence of tags is called an ele
`ment: elements may be further enriched by attaching name
`value pairs (for example, country--"US” in the example
`above) called attributes. Its simple syntax is easy to process
`by machine, and has the attraction of remaining understand
`able to humans. XML is based on SGML, and is familiar in
`look and feel to those accustomed to HTML.
`Building Applications with XML
`XML is a low-level syntax for representing structured data.
`You can use this simple syntax to Support a wide variety of
`applications. For this reason, XML now underpins a number
`of Web markup languages and applications.
`Outside and inside W3C, many groups are already defining
`new formats for information interchange. The number of
`XML applications is growing rapidly, and the growth appears
`likely to continue. There are many areas, for example, the
`health-care industry, the on-line revenue generation, database
`analysis and government and finance, where XML applica
`tions are used to store and process data. XML as a simple
`method for data representation and organization will mean
`that problems of data incompatibility and tedious manual
`re-keying will become more manageable.
`Therefore, it would be highly desirable to have an XML
`based communications method and protocol capable of
`enabling the integration of varying security and environmen
`tal hardware monitoring devices, and allowing communica
`tion between said devices and a core system application for
`the purpose of monitoring security systems and/or environ
`mental systems within one or more Subject sites, both on site
`and remotely using direct and indirect means.
`
`10
`
`15
`
`25
`
`30
`
`35
`
`40
`
`Case 6:20-cv-00769-ADA Document 1-3 Filed 08/25/20 Page 13 of 20
`
`SUMMARY OF THE INVENTION
`
`It is therefore a principal object of the instant invention to
`provide a multiple site, integrated security system which
`incorporates and enhances the performance of human guards
`within said security system and a method and protocol for
`communications between real time hardware and a real time
`security monitoring Software system.
`It is another object of the instant invention to provide the
`human guards with the latest technology, in the form of wear
`able and hand held computers or other data processors
`capable of wireless communications, in order to make the
`guards more knowledgeable and responsible to the guarded
`facilities complex interactive environment.
`Another object of the instant invention is to provide a
`method and communications protocol which would be flex
`ible in incorporating new technology and pre-existing hard
`ware equipment thus providing a high level of integration
`with off the shelf security devices now existing or not yet
`conceived.
`It is a further object of the instant invention to provide a
`system of security which is able to be custom configured and
`scaled up or down, by being individually tailored to site
`conditions such as site component configurations, checkpoint
`locations, building type material, building transportation sys
`
`45
`
`50
`
`55
`
`60
`
`65
`
`
`
`US 7,990,268 B2
`
`7
`Yet another object of the present invention is to provide a
`means of communication via the Internet with a central con
`sole monitoring application.
`Still another object of the present invention is to provide a
`system with failure-resistance and robustness against hard
`ware denials and intentional attacks by providing databackup
`on both facilities site and a security headquarter levels.
`It is yet another object of the present invention to provide a
`computer implemented communications protocol capable of
`communicating with preexisting and/or pre-built system con
`figurations to be installed at specific kinds of sites.
`It is another object of the present invention to provide a
`computer implemented communications protocol which
`would support several levels of software security, users, data,
`application and communication, and whereby security tasks
`are performed and Verified by the guard during the guard tour
`and that information is recorded by the guard in a checkpoint
`data processing application, then a base station processing
`application. The ability to provide central monitoring of
`guard tours is dependent upon novel wearable and hand held
`devices which are capable of wireless communications with
`the data processing checkpoint stations.
`Briefly, the objects and advantages of the present invention
`are realized by providing a computer implemented process
`for real time communications between security hardware
`devices and a security system core application (SCA). The
`security devices transmit data in varying device language. A
`security site checkpoint computer collects data messages
`from these security devices and translates the device language
`into standardized converted messages before input into and
`use by the SCA. The SCA then generates a message and
`transmits converted messages via various direct and indirect
`means to other computers running the security SCA. Base
`station computers then receive said messages and analyzes,
`reports and logs the transmitted messages for the purpose of
`monitoring environmental and security conditions within a
`Subject site.
`Therefore, a new and improved computer implemented
`communications protocol is provided, which is an XML
`based communications protocol for security monitoring pur
`40
`poses. This unique XML based communications protocol is
`implemented through numerous modules which receive and
`convert data messages from diverse security devices and sen
`sors, standardize and send converted messages, and encrypt
`and decrypt said data messages as necessary. With the set
`modules, the data messages are filtered and transmitted from
`checkpoint computers to base station computers, which ana
`lyzes, reports and logs environmental as well as security
`events within a Subject site. The resulting integrated security
`system provides better trained security guards, who are more
`alert and responsive, and more closely Supervised and easily
`scheduled, enhanced financial monitoring, more accurately
`paid and costed security services, better archived and
`reported security related events, as well as being better coor
`dinated with public agencies, enhanced safety, and readily
`upgraded and integrated with existing and future technolo
`gies.
`Other objects and advantages of the present invention will
`become apparent to those of skill in the art upon contempla
`tion of the disclosure herein in conjunction with the drawings
`as described below.
`
`10
`
`15
`
`25
`
`30
`
`35
`
`45
`
`50
`
`55
`
`60
`
`8
`reference to the following description of the embodiment of
`the invention in conjunction with the accompanying draw
`ings, wherein:
`FIG. 1 is a representational diagram of a multiple site
`integrated security system constructed in accordance with the
`present invention;
`FIG. 2 is an enlarged detailed diagram of a communica
`tions scheme between multiple checkpoint data processors
`and a central base station computer, constructed in accor
`dance with the present invention;
`FIG. 3 is an enlarged detailed diagram of a headquarters
`server with multiple workstations and hard wired as well as
`global computer network communications capabilities, con
`structed in accordance with the present invention;
`FIG. 4 is a block diagram of the checkpoint data processing
`architecture and communications system between the Secu
`rity system event sensors and said checkpoint data processor,
`in greater detail, constructed in accordance with the present
`invention;
`FIG.5 is a block diagram showing the checkpoint hardware
`architecture in greater detail, including communications
`routes between numerous checkpoint data processing units
`and a base station, constructed in accordance with the present
`invention;
`FIG. 6 is a block diagram of an integrated security system
`encrypted XML communications protocol illustrating com
`munications between system sensors, checkpoint data pro
`cessing units and the system core applicationatabase station,
`constructed in accordance with the present invention;
`FIG. 7 is a block diagram illustrating the three basic levels
`of architecture in the strategy and functioning of the overall
`method and protocol for real time security system communi
`cations; and
`FIG. 8 is a block diagram of the XML based communica
`tions protocol illustrating the interaction of input devices,
`conversion and encryption modules, with the various mod
`ules within a system core application, constructed in accor
`dance with the present invention.
`
`DESCRIPTION OF THE PREFERRED
`EMBODIMENTS
`
`Referring now to the drawings, and more particularly to
`FIG. 1 thereof, there is shown a new and improved multiple
`site integrated enhanced human oriented security system 10.
`Specifically, the multiple site integrated security system 10 as
`represented by FIG. 1 and constructed in accordance with the
`present invention, uses direct communication 22 and indirect
`communication (for example use of a global computer net
`work like the Internet 20) methods of communication
`between a central headquarters 16 and one or more facilities
`sites 12 and 14. Direct communication is defined as a point
`to-point connection containing a hard wired and/or wireless
`components in which the sender and receiver are not sepa
`rated by Switching nodes. One example of this is the commu
`nication between a wireless transmitter and a wireless
`receiver. On the other hand, indirect